[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [Xen-users] Compiling VMWare server against xen dom0 enabledkernel
I'm
running xen 3.0 testing (downloaded yesterday) and VMware Server 1.0.1 and it
does not work for me. VMware Server compiles and loads fine but while
starting up a VMware VM I get the below error.
general protection fault: 0000 [#1]
SMP Modules linked in: vmnet parport_pc vmmon unionfs xt_physdev iptable_filter ip_tables x_tables bridg e nfsd exportfs lockd ipv6 lp parport autofs4 sunrpc binfmt_misc vfat fat video thermal processor fa n container button battery ac uhci_hcd usb_storage e1000 floppy sg dm_snapshot dm_zero dm_mirror ext 3 jbd dm_mod megaraid_mbox megaraid_mm mptscsih mptbase sd_mod scsi_mod CPU: 0 EIP: 0061:[<ee60a3c3>] Tainted: PF VLI EFLAGS: 00010202 (2.6.16.13-xen #1) EIP is at Task_Switch+0x153/0xa90 [vmmon] eax: fe800000 ebx: ee5ee000 ecx: fe80e040 edx: dfc57000 esi: 00000660 edi: ee5ee400 ebp: 00000000 esp: ea3f9aa4 ds: 007b es: 007b ss: 0069 Process vmware-vmx (pid: 26093, threadinfo=ea3f8000 task=e7046560) Stack: <0>dfc57000 ea3f9acc ea3f9acd ea3f9ace ea3f9acf 4309ddf0 8005003b 00000296 00000000 00000033 00000000 0000efff 0000fe80 00000000 ece4a000 0000efff c017fe80 ecea3b00 0037813e ee5ee000 dfc57000 0000006b 00000000 ee60d9e2 Call Trace: [<c017fe80>] open_namei+0x2e0/0x6c0 [<ee60d9e2>] Vmx86_RunVM+0xd2/0x230 [vmmon] [<ee60433f>] LinuxDriver_Ioctl+0x5cf/0xc30 [vmmon] [<ee0d43f6>] ext3_mark_iloc_dirty+0x26/0x40 [ext3] [<ee0d4520>] ext3_mark_inode_dirty+0x50/0x60 [ext3] [<ee085c52>] do_get_write_access+0x382/0x520 [jbd] [<c0117bc5>] __kmap_atomic+0xe5/0x1c0 [<c0117cca>] kmap_atomic+0x2a/0x30 [<c014bc62>] buffered_rmqueue+0x202/0x2b0 [<c014beb2>] get_page_from_freelist+0xc2/0xf0 [<c014bf37>] __alloc_pages+0x57/0x320 [<c01591c8>] do_anonymous_page+0x2f8/0x310 [<c01a6450>] proc_alloc_inode+0x0/0x70 [<c01a6499>] proc_alloc_inode+0x49/0x70 [<c018a6d9>] alloc_inode+0xe9/0x1b0 [<c018b2f7>] get_new_inode_fast+0x47/0x140 [<c02445e6>] notify_remote_via_irq+0x26/0x30 [<c01036d7>] __switch_to+0x127/0x4c0 [<c0108fd1>] monotonic_clock+0x51/0xa0 [<c0110263>] send_IPI_mask_bitmask+0x63/0xe0 [<c011a00b>] try_to_wake_up+0x2cb/0x390 [<c0117cca>] kmap_atomic+0x2a/0x30 [<c014bc62>] buffered_rmqueue+0x202/0x2b0 [<c01036d7>] __switch_to+0x127/0x4c0 [<c014beb2>] get_page_from_freelist+0xc2/0xf0 [<c02445e6>] notify_remote_via_irq+0x26/0x30 [<c0108fd1>] monotonic_clock+0x51/0xa0 [<c0110263>] send_IPI_mask_bitmask+0x63/0xe0 [<c011a00b>] try_to_wake_up+0x2cb/0x390 [<c01036d7>] __switch_to+0x127/0x4c0 [<c011a00b>] try_to_wake_up+0x2cb/0x390 [<c011ae7d>] find_busiest_group+0xed/0x3a0 [<c0126d57>] do_setitimer+0x347/0x670 [<c0124a87>] forget_original_parent+0x17/0x1b0 [<c0183360>] do_ioctl+0x70/0xb0 [<c0183565>] vfs_ioctl+0x65/0x200 [<c01270dc>] sys_setitimer+0x5c/0xd0 [<c0183788>] sys_ioctl+0x88/0xa0 [<c01050d5>] syscall_call+0x7/0xb Code: 3c 8d bb 00 04 00 00 89 44 24 2c 8b 44 24 40 66 89 44 24 30 8b 44 24 2c 66 89 83 00 04 00 00 8 b 44 24 2e 89 47 02 74 15 8d 0c 08 <0f> b6 51 05 89 d0 83 e0 0f 83 f8 0b 0f 84 62 01 00 00 80 bb 6b
_______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-users
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |